Computer Awareness Quiz Set 26

Candidates can practice the given Questions And Answers below of Computer Awareness with a detailed Explanation. So Aspirants can follow this website for more current Affairs Quizzes. So study this set no. 26 thoroughly and is useful for all competitive examinations.

Computer Awareness Quiz Set 26

1. Proprietary Software is also known as ________

A. Closed Source Software

B. Open Source Software

C. Commercial Software

D. All of these

Loading...

2. A coding language that is compatible with windows servers which is used for increased functionality on a website or to work with a database is known as _______

A. HTML

B. ASP

C. XML

D. All of these

Loading...

3. In the relational modes, cardinality is termed as _________

A. number of tuples

B. number of tables

C. Both (A) and (B)

D. All of these

Loading...

4. Which of the following memory chip is faster?

A. DRAM

B. RAM

C. SRAM

D. All of these

Loading...

5. A set of flip flops integrated together is called ____

A. Counter

B. Adder

C. Register

D. All of these

Loading...

6. The technique that extends storage capacities of main memory beyond the actual size of the main memory is called _______

A. switching

B. virtual storage

C. multitasking

D. All of these

Loading...

7. A mistake in an algorithm that causes incorrect results is called a ______

A. logical error

B. syntax error

C. procedural error

D. compiler error

Loading...

8. A product that is owned exclusively by a single company that can only function properly, if it is used with other products owned by the same company?

A. Proprietary Software

B. Public Domain Software

C. Commercial Software

D. All of these

Loading...

9. The terminal device that functions as a cash register, computer terminal, and OCR reader is the _____

A. Data collection terminal

B. OCR register terminal

C. Video Display Terminal

D. POS terminal

Loading...

10. A language reflects the way people think mathematically is known as _____

A. cross-platform programming

B. functional

C. event driven programming

D. 3GL business programming

Loading...

11. A reliability & flow control technique where the source sends one packet starts a timer and waits for an acknowledgment before sending a new packet is called _______

A. Positive Acknowledgement Retransmission (PAR)

B. Checksum

C. Routing

D. All of these

Loading...

12. Mail from unwanted senders can be blocked by ______

A. e-mailing them & asking to be removed from the list

B. using mail filters

C. clicking the unsubscribe link

D. All of these

Loading...

13. A program that generally has more user-friendly interface than a DBMS is called a ______

A. back end

B. front end

C. form

D. All of these

Loading...

14. A type of malicious software that is activated each time your system boots up. This malicious software difficult to detect because they are activated before your system’s &
Operating System has completely booted up is called _____

A. Phishing

B. Rootkits

C. Pharming

D. All of these

Loading...

15. Modifying data for fun and profit is defined as _____

A. Distributed DoS attack

B. Denial of Service (DoS) attack

C. Data Diddling

D. All of these

Loading...

16. An attacker outside your network pretends to be a part of your network or legal terminal is called ______

A. Password Attacks

B. IP Spoofing

C. Identity Theft

D. All of these

Loading...

17. Which of the following is possible with open architecture?

A. Hot swapping of devices

B. A minimum of six new devices to be added to a computer

C. Users to upgrade and add new devices as they come on the market

D. All of these

Loading...

18. Which combines efficient implementation techniques that enable them to be used in an extremely large database?

A. Data Mining

B. Data Manipulation

C. Data reliability

D. All of these

Loading...

19. Overwhelming or saturating resources on a target system to cause a reduction of availability to legitimate users is termed as _______

A. Distributed DoS attack

B. Denial of Service (DoS) attack

C. Data Diddling

D. All of these

Loading...

20. Internet-mediated attack accomplished by enlisting the services of many compromised systems to launch a denial of service (DoS) is termed as ______

A. Distributed DoS attack

B. Denial of Service (DoS) attack

C. Data Diddling

D. All of these

Loading...

21. ______ is used by public & private enterprises to publish and share financial information with each other and industry analysts across all computer platforms & the Internet.

A. Extensible Markup Language (XML)

B. Extensible Business Reporting Language (XBRL)

C. Enterprise Application Integration (EAI)

D. All of these

Loading...

22. A long message that needs to be transmitted is broken into smaller packets of fixed size for error free transmission is termed as ______

A. Data Sequencing

B. Flow Control

C. Error control

D. All of these

Loading...

23. _____ is one reason for problems of data integrity.

A. Data availability constraints

B. Data inconsistency

C. Data redundancy

D. All of these

Loading...

24. Which of the following is an advantage of mounting an application on the web?

A. the possibility of 24-hour access for users

B. creating a system that can extend globally

C. standardizing the design of the interface

D. All of these

Loading...

25. A list of rules for transferring data over a network is called ______

A. Protocol

B. Program code

C. Rules

D. All of these

Loading...

26. Which of the following domains is used for profit businesses?

A. .com

B. .edu

C. .net

D. All of these

Loading...

27. A key that is used to alternate the input mode of a group of keys on a keyboard is known as _____

A. Function keys

B. Alphanumeric keys

C. Toggle Keys

D. All of these

Loading...

28. An intelligent Hub that has the ability to determine the destination of a packet sent across the network is called ______